steeno / EU4ConsolePatcher

A simple memory patcher which enables the internal developer console in ironman mode
MIT License
89 stars 15 forks source link

Doesn't work anymore for 1.37 #17

Open nyanzan opened 5 months ago

nyanzan commented 5 months ago

What the title says. It worked all the way up to now but at 1.37 it doesn't anymore

rupertman commented 5 months ago

same :(

SKKachaev commented 5 months ago

same for me :(

Snuskmumric commented 5 months ago

Created an account just to say. "Same here" :( AOB-scan also does not work. Something changed in 1.37, mightve made it harder or removed the possibility?

steeno commented 5 months ago

Hey guys, thanks for the messages. i will take a look later and probably provide an update, most likely just for the cheat engine tables right now.

Snuskmumric commented 5 months ago

Hey guys, thanks for the messages. i will take a look later and probably provide an update, most likely just for the cheat engine tables right now.

Awesome, anything that works. If its a CE script or your own. :)

steeno commented 5 months ago

https://github.com/steeno/EU4ConsolePatcher/releases/tag/v1.37.0.0 should work again, i tested it only shortly, so would be nice if you could confirm if it works or not =)

rupertman commented 5 months ago

Would there be any possibility of an updated or revamped .exe file instead of a CE script in the near future? It's just I personally don't have CE installed, I've been going off the executable itself that you've created.

steeno commented 5 months ago

Ok, wait a moment, will at least provide a small update of the application so that it works again.

steeno commented 5 months ago

@rupertman updated executable is also available now

rupertman commented 5 months ago

It seems to work for me now thanks king.

Noswin commented 5 months ago

You are the boss, thanks a lot

JacobScottKessler commented 5 months ago

This isn't working for me. The normal .exe flashed up and away like normal but didn't work so I tried the debug version and that said it worked but also didn't work. Output of that is included.

Trying to enable debug privileges for the current process Debug privileges enabled Trying to find process eu4.exe process name: [System Process] process name: System process name: Secure System process name: Registry process name: smss.exe process name: csrss.exe process name: wininit.exe process name: csrss.exe process name: services.exe process name: LsaIso.exe process name: lsass.exe process name: svchost.exe process name: fontdrvhost.exe process name: WUDFHost.exe process name: svchost.exe process name: svchost.exe process name: WUDFHost.exe process name: WUDFHost.exe process name: WUDFHost.exe process name: winlogon.exe process name: fontdrvhost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: dwm.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: IntelCpHDCPSvc.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: NVDisplay.Container.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: Memory Compression process name: svchost.exe process name: svchost.exe process name: WmiPrvSE.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: unsecapp.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: spoolsv.exe process name: svchost.exe process name: wlanext.exe process name: svchost.exe process name: conhost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: ElevocControlService.exe process name: OneApp.IGCC.WinService.exe process name: LenovoUtilityService.exe process name: Lenovo.Modern.ImController.exe process name: IntelAudioService.exe process name: svchost.exe process name: svchost.exe process name: LenovoWMService.exe process name: logi_lamparray_service.exe process name: servicehost.exe process name: svchost.exe process name: svchost.exe process name: NahimicService.exe process name: Tobii.Service.exe process name: RtkAudUService64.exe process name: UDClientService.exe process name: OfficeClickToRun.exe process name: nvcontainer.exe process name: MpDefenderCoreService.exe process name: WMIRegistrationService.exe process name: MsMpEng.exe process name: ipfsvc.exe process name: jhi_service.exe process name: ipf_uf.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: sihost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: AggregatorHost.exe process name: taskhostw.exe process name: svchost.exe process name: explorer.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: SearchIndexer.exe process name: svchost.exe process name: svchost.exe process name: SearchHost.exe process name: StartMenuExperienceHost.exe process name: RuntimeBroker.exe process name: RuntimeBroker.exe process name: svchost.exe process name: svchost.exe process name: ctfmon.exe process name: LockApp.exe process name: RuntimeBroker.exe process name: svchost.exe process name: NisSrv.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: SystemNotificationPlugin.exe process name: conhost.exe process name: SecurityHealthService.exe process name: TextInputHost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: svchost.exe process name: Locator.exe process name: ShellExperienceHost.exe process name: RuntimeBroker.exe process name: WmiApSrv.exe process name: svchost.exe process name: Nahimic3.exe process name: RuntimeBroker.exe process name: XboxGameBarSpotify.exe process name: RuntimeBroker.exe process name: LenovoVantageService.exe process name: LenovoVantage-(VantageCoreAddin).exe process name: LenovoVantage-(LenovoGamingSystemAddin).exe process name: svchost.exe process name: OneDrive.exe process name: taskhostw.exe process name: backgroundTaskHost.exe process name: imperator.exe process name: ApplicationFrameHost.exe process name: backgroundTaskHost.exe process name: imperator.exe process name: backgroundTaskHost.exe process name: backgroundTaskHost.exe process name: backgroundTaskHost.exe process name: backgroundTaskHost.exe process name: backgroundTaskHost.exe process name: backgroundTaskHost.exe process name: backgroundTaskHost.exe process name: backgroundTaskHost.exe process name: victoria3.exe process name: msteams.exe process name: platform_runtime_ALENOVOYX80_service.exe process name: svchost.exe process name: platform_runtime_RGB_service.exe process name: backgroundTaskHost.exe process name: svchost.exe process name: eu4.exe th32ProcessID: 0x50bc th32ModuleID: 0x0 eu4.exe process found Trying to find module eu4.exe module name: eu4.exe modBaseAddress: 0x7ff7df250000 modBaseSize: 0x25da000 eu4.exe module found Trying to find memory patterns processHandle: 0x0000000000000138 BaseAddress: 0x00007FF7DF250000 RegionSize: 0x1000 PageSize: 0x1000 bytesRead: 25da000 pattern: 74 ?? C6 44 24 40 00 B9 offset: 0x0 Pattern not found First memory pattern could not be found, using fallback offset First memory pattern found processHandle: 0x0000000000000138 BaseAddress: 0x00007FF7DF250000 RegionSize: 0x1000 PageSize: 0x1000 bytesRead: 25da000 pattern: 74 ?? C7 04 offset: 0x0 Pattern not found Second memory pattern could not be found, using fallback offset Second memory pattern found Trying to apply patches Trying to patch: 0x7ff7e096df5d:1 processHandle: 0x0000000000000134 BaseAddress: 0x00007FF7E096D000 RegionSize: 0x446000 PageSize: 0x1000 bytesWritten: 1 Patch applied successfully Trying to patch: 0x7ff7e096e27b:1 processHandle: 0x0000000000000138 BaseAddress: 0x00007FF7E096E000 RegionSize: 0x445000 PageSize: 0x1000 bytesWritten: 1 Patch applied successfully Press any key to continue . . .

Snuskmumric commented 5 months ago

Exe worked for me.

steeno commented 5 months ago

@JacobScottKessler are you using the steam version and if so definitely the new patch 1.37.0.0 (so no older version selected in steam game settings)? if i remember correctly there exists also a microsoft store version and in the past when EU4 was part of game pass there were also differences between the steam version and the ms store version. So just to be sure, which game version are you using?

JacobScottKessler commented 5 months ago

I'm using steam on the latest patch with the DLC

EDIT: I tried adding the folder I keep the debug version of the program in to be ignored by my virus protection and it still does not work.

Is there some sort of install instruction I might have missed? Does it need to be run from a specific folder?

EDIT2: I tried a full restart of my system even though it didn't work previously, but now it does. I'm not sure whats making it inconsistent but this time I was able top access the console.

steeno commented 5 months ago

Hmm weird, so there are no install instructions, just run the game, load a game, run the executable after you are in-game and that's all =/ then you should be able to open the console via ~ and use any command, in theory ;D

JacobScottKessler commented 5 months ago

Yeah I don't know whats going on because sometimes it won't work at all, sometimes it works just fine. Its a roll of the dice every time I start up.